| A | B |
| Adware | Software designed to embed advertisements into applications being used |
| Boot Sector Virus | Infects the system files that your computer uses every time it is turned on |
| Computer Virus | A computer program written to alter the way a computer operates |
| Dictionary Attack | Destructive program designed to discover personal/computer passwords |
| File Virus | Type of virus that inserts a destructive code into executable files |
| How viruses are spread | Email, websites, networks, phishing, hackers, messaging, mobile devices, family and friends |
| Logic Bomb | Programmed to initiate on a specific date or when specific events occur |
| Macro Virus | Infects documents and causes a sequence of events to perform automatically when the application is started |
| Malware | Short for malicious software. Example: Trojan Horse |
| Memory Resident Virus | Resides in the RAM and are initiated from viruses which run on computers and then hide in memory |
| Passwords | Mix letters, numbers and symbols; upper and lower case letters |
| Phishing & Spoofing | Actions taken through email to falsely gather personal information about the user |
| Protect your computer with . . . | Anti-virus software, avoid rogue websites, don't open suspicious attachments |
| Social Engineering | The act of obtaining or attempting to obtain secure data by conning individuals into revealing personal information |
| Spyware | Software that gathers user information through the user's Internet connection without his knowledge |
| Trojan Horse | A computer program that seems to perform one function while actually doing something else |
| Types of viruses | Trojan Horse, Worm, Macro, Memory Resident, Boot Sector, Logic Bomb |
| Viruses can . . . | corrupt files; destroy data, display messages, corrupt systems |
| War Driving | Act of driving around with a laptop or other mobiel device in order to use unauthorized wireless services for hacking or other unethical purposes |
| Worm | Program designed to enter a computer system, usually through a network, through security holes and then replicate itself |